Trump vows “We’re Going To Take Back Our Country SOONER THAN YOU THINK! You will see things you’ve never seen before!” Trump Will Not Return as The President of The Bankrupt U.S. Corporation, but rather The President of The New Republic of The United States! In this New American Republic We The People have all the power. There is NO FEDERAL INCOME TAX! And America returns to The Gold Standard! Plus NESARA will be enacted and all debts of every American will be cancelled!
Well-connected, political insider Juan O Savin exposes SEVERAL Deep State scams on the American public, and discusses them in-detail. Don’t give up, Patriots. We are going to take back America!!!
John McAfee’s Dead Man Switch will be released tomorrow afternoon on Jessie’s Right on Radio Show.
This video was produced for archiving purposes to provide some information about some events in John McAfee’s life and thinking before he was assassinated* in Spain.
(Natural News) Many people are unaware of just how long Anthony Fauci has been a mainstay in the federal government. Going back all the way to the early 1980s, Fauci has been trying to scare people into fearing their loved ones, just as he continues to do today with the Wuhan coronavirus (Covid-19).
Back in 1983, it was AIDS that Fauci was touting as the scary “pandemic” of that day. He was the first to publish an article in the Journal of the American Medical Association (JAMA) warning that people within the same household could spread AIDS to each other without sexual contact, which was never actually proven.
The mainstream media ran with Fauci’s narrative, though, even though it lacked definitive scientific proof. A UPI wire dated May 5, 1983 warned that “Household contacts can transmit AIDS” – again, despite the fact that Fauci never proved this and even admitted to such.
From there, fear began to spread as people worried that they might catch AIDS from their kids or their doctors, or perhaps the waitress at the local diner. AIDS was everywhere, was the messaging that was trumpeted, thanks to Fauci’s claims, and the goal was to get everyone “vaccinated” for AIDS at some point in the future.
That plan failed when the medical establishment never actually came up with a workable jab for AIDS, but you can be sure that Fauci tried. And he has continually tried with each new iteration of some scary new virus, whether it was MERS, SARS, or most recently the Chinese Virus.
Back in 2017, few would have disputed that Israel and Saudi Arabia were regional foes. Officially, the countries had no diplomatic ties. Yet for a small group of Israeli businesspeople attending secret meetings with Saudi officials in Vienna, Cyprus and Riyadh that summer, there were signs relations were warming.
The businesspeople represented NSO Group. Their mission was to sell the Saudis NSO’s weapons–grade spyware system, Pegasus.
According to a person who attended the meeting in June 2017 in Cyprus, a senior Saudi intelligence official was “amazed” by what he saw. After a lengthy and technical discussion, the Saudi spy, who had brought a new iPhone, was shown how Pegasus could infect the phone and then be used to remotely operate its camera.
“You don’t need to understand the language to see they were amazed and excited and that they saw what they needed to,” the person said.
NSO Group had been given explicit permission by the Israeli government to try to sell the homegrown hacking tools to the Saudis. It was a classified arrangement and resulted in the sale later being sealed in Riyadh in a deal reportedly worth at least $55m.
“In Israel there is a strong political movement to make diplomacy through business,” said the person, speaking on the condition of anonymity. “Business first, diplomacy later. When you make a deal together, it opens a lot of doors to diplomacy.”
It is common for governments to help companies export their products. NSO, after all, employs former Israeli cyber-intelligence officials and retains links to the defence ministry.
But revelations about how repressive states such as Saudi Arabia, the United Arab Emirates, Azerbaijan and others have used NSO’s technology to target human rights lawyers, activists and journalists raise questions for Israel and have put the issue under fresh scrutiny.
The disclosures threaten to put diplomatic pressure on Israel, amid questions over whether it is using the licensing of NSO’s spyware for political leverage – and allowing the software to be sold to undemocratic countries that are likely to misuse it.
A recent transparency report released by NSO Group acknowledged the company was “closely regulated” by export control authorities in Israel. The Defense Export Controls Agency (DECA) within the Israeli defence ministry “strictly restricts” the licensing of some surveillance products based on its own analysis of potential customers from a human rights perspective, the company said, and had rejected NSO requests for export licences “in quite a few cases”.
Moreover, NSO was also subject to an “in-depth” regulatory review by Israel on top of its own “robust internal framework”.
Within NSO, the process Israel uses to assess whether countries can be sold the technology is considered a “state secret”. A person familiar with the process said officials in both Israel’s national security council and prime minister’s office had been known to give their input.
In the case of Saudi Arabia, sources familiar with the matter said the kingdom was temporarily cut off from using Pegasus in 2018, for several months, following the murder of Jamal Khashoggi, but was allowed to begin using the spyware again in 2019 following the intervention of the Israeli government.
It is unclear why the Israeli government urged NSO to reconnect the surveillance tool for Riyadh.
However, the 10 countries that the forensic analysis for the Pegasus project suggests have actually been abusing the technology all enjoy trade relations with Israel or have diplomatic ties with the country that have been improving markedly in recent years.
In two NSO client countries, India and Hungary, it appears governments began using the company’s technology as or after their respective prime ministers met the then Israeli prime minister, Benjamin Netanyahu, in high-profile encounters intended to boost trade and security cooperation. It is understood no countries that are considered enemies of Israel – such as Turkey – have been allowed to buy NSO’s wares.
“Markets dictate what works, I don’t dictate … the only place I have actually intervened … is cybersecurity,” Netanyahu said in a press conference in Hungary in 2017 as he stood next to the country’s prime minister, Viktor Orbán.
What remains unclear is whether Israel’s intelligence agencies might have special privileges with NSO, such as access to surveillance material gathered using its spyware. One person close to the company, who asked to remain anonymous, said it was a frequent topic of speculation. Asked whether Israel could access intelligence gathered by NSO clients, they replied: “The Americans think so.”
That view was supported by current and former US intelligence officials, who told the Washington Post, a partner in the Pegasus project, that there was a presumption that Israel had some access – via a “backdoor” – to intelligence unearthed via such surveillance tools.
John Scott-Railton, a senior researcher at the Citizen Lab at the University of Toronto, said he believed it would be “irresponsible” for a state to allow the large-scale distribution of a powerful surveillance tool such as Pegasus without being able to keep an eye on what was being done with it.
He said court records had revealed that NSO used servers that were not always located on the premises of the client. “What that means is there’s the potential for visibility. And it would be crazy for them [the Israelis] not to have visibility,” he said.
NSO strongly denied that Israel had any access to its customers’ systems.
“NSO Group is a private company. It is not a ‘tool of Israeli diplomacy’; it is not a backdoor for Israeli intelligence; and it does not take direction from any government leader,” NSO’s lawyer said.
In a statement, the Israeli Ministry of Defense said Israel marketed and exported cyber products in accordance with its 2007 Defense Export Control Act and that policy decisions take “national security and strategic considerations” into account, which include adherence to international arrangements.
“As a matter of policy, the state of Israel approves the export of cyber products exclusively to governmental entities, for lawful use, and only for the purpose of preventing and investigating crime and counter-terrorism, under end-use/end-user certificates provided by the acquiring government,” the ministry said.
It said “appropriate measures” were taken in cases where exported items are used in violation of export licences.
The ministry added: “Israel does not have access to the information gathered by NSO’s clients.”
For Israel, few clients whom it has approved to use Pegasus have been as problematic as Saudi. Weeks ago, NSO cut the kingdom off once more, following allegations that Saudi had used Pegasus to hack dozens of Al Jazeera journalists.
It is the name for perhaps the most powerful piece of spyware ever developed – certainly by a private company. Once it has wormed its way on to your phone, without you noticing, it can turn it into a 24-hour surveillance device. It can copy messages you send or receive, harvest your photos and record your calls. It might secretly film you through your phone’s camera, or activate the microphone to record your conversations. It can potentially pinpoint where you are, where you’ve been, and who you’ve met.
Pegasus is the hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones running either iOS or Android operating systems.
The earliest version of Pegasus discovered, which was captured by researchers in 2016, infected phones through what is called spear-phishing – text messages or emails that trick a target into clicking on a malicious link.
Since then, however, NSO’s attack capabilities have become more advanced. Pegasus infections can be achieved through so-called “zero-click” attacks, which do not require any interaction from the phone’s owner in order to succeed. These will often exploit “zero-day” vulnerabilities, which are flaws or bugs in an operating system that the mobile phone’s manufacturer does not yet know about and so has not been able to fix.
In 2019 WhatsApp revealed that NSO’s software had been used to send malware to more than 1,400 phones by exploiting a zero-day vulnerability. Simply by placing a WhatsApp call to a target device, malicious Pegasus code could be installed on the phone, even if the target never answered the call. More recently NSO has begun exploiting vulnerabilities in Apple’s iMessage software, giving it backdoor access to hundreds of millions of iPhones. Apple says it is continually updating its software to prevent such attacks.
Technical understanding of Pegasus, and how to find the evidential breadcrumbs it leaves on a phone after a successful infection, has been improved by research conducted by Claudio Guarnieri, who runs Amnesty International’s Berlin-based Security Lab.
“Things are becoming a lot more complicated for the targets to notice,” said Guarnieri, who explained that NSO clients had largely abandoned suspicious SMS messages for more subtle zero-click attacks.
For companies such as NSO, exploiting software that is either installed on devices by default, such as iMessage, or is very widely used, such as WhatsApp, is especially attractive, because it dramatically increases the number of mobile phones Pegasus can successfully attack.
As the technical partner of the Pegasus project, an international consortium of media organisations including the Guardian, Amnesty’s lab has discovered traces of successful attacks by Pegasus customers on iPhones running up-to-date versions of Apple’s iOS. The attacks were carried out as recently as July 2021.
Forensic analysis of the phones of victims has also identified evidence suggesting NSO’s constant search for weaknesses may have expanded to other commonplace apps. In some of the cases analysed by Guarnieri and his team, peculiar network traffic relating to Apple’s Photos and Music apps can be seen at the times of the infections, suggesting NSO may have begun leveraging new vulnerabilities.
Where neither spear-phishing nor zero-click attacks succeed, Pegasus can also be installed over a wireless transceiver located near a target, or, according to an NSO brochure, simply manually installed if an agent can steal the target’s phone.
Once installed on a phone, Pegasus can harvest more or less any information or extract any file. SMS messages, address books, call history, calendars, emails and internet browsing histories can all be exfiltrated.
“When an iPhone is compromised, it’s done in such a way that allows the attacker to obtain so-called root privileges, or administrative privileges, on the device,” said Guarnieri. “Pegasus can do more than what the owner of the device can do.”
Lawyers for NSO claimed that Amnesty International’s technical report was conjecture, describing it as “a compilation of speculative and baseless assumptions”. However, they did not dispute any of its specific findings or conclusions.
NSO has invested substantial effort in making its software difficult to detect and Pegasus infections are now very hard to identify. Security researchers suspect more recent versions of Pegasus only ever inhabit the phone’s temporary memory, rather than its hard drive, meaning that once the phone is powered down virtually all trace of the software vanishes.
One of the most significant challenges that Pegasus presents to journalists and human rights defenders is the fact that the software exploits undiscovered vulnerabilities, meaning even the most security-conscious mobile phone user cannot prevent an attack.
“This is a question that gets asked to me pretty much every time we do forensics with somebody: ‘What can I do to stop this happening again?’” said Guarnieri. “The real honest answer is nothing.”
The [DS]/corrupt politicians are now bracing for the shock wave. The truth and facts are coming out the people are going to wake up and understand that the election was controlled by the [DS] players. The [DS] will deploy every asset they have to stop this, prepare for [zero-day] communication blackout. The [DS] will not stop there, they will then push riots and try to make it seem like the Trump supporters became upset because Trump was not reinstated in August. This will fail, the truth always wins.